共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
3.
4.
基于组合区域形状特征的物体检测算法 总被引:1,自引:0,他引:1
该文提出了一种基于组合区域形状特征的物体检测算法,通过图像分割后各个区域之间的关系,组合选取候选目标,提取候选目标夹角链码和弧弦距比特征,构造并联支持向量机分类器。算法对分割要求不高,可对模糊和低对比度的图像目标进行正确检测。通过在ETHZ图像类库上对算法进行测试,验证了算法的准确性。 相似文献
5.
6.
7.
针对。感卫星图像的云检测,提出了基于最小化支持向量数分类器的云检测方案,解决传统分类器训练样本多、易陷入局部最优的问题。使用该分类器对QuickBird高分辨率。感图像进行云检测,检测正确率达99%以上。实验表明:在确定分类器内部结构参数过程中,与传统的交叉验证法相比,基于支持向量数的方法不仅能够准确预测分类器推广性能的变化趋势,从而确立最优化的参数组合,并且实现简单,大大减少了计算的复杂度。与传统的BP神经网络相比,该方法所需训练样本少,分类性能好。 相似文献
8.
基于粗糙集属性约简的SVM异常入侵检测方法 总被引:1,自引:2,他引:1
文章提出了基于粗糙集属性约简的支持向量异常入侵检测方法。为验证该方法的有效性,对实验数据集KDD99分别用粗糙集属性约简的支持向量分类方法和传统的支持向量分类方法进行实验仿真,并把两者的实验结果进行对比。实验证明,基于粗糙集属性约简的支持向量异常入侵检测方法在检测精度相当的情况下,有效的降低了检测时间并减少了存储空间。 相似文献
9.
10.
比较了基于异常网络入侵检测的两类方法,分析了它们各自的特点。两类方法的优缺点可以互补,融合这两类方法可以形成一种新的入侵检测方法。 相似文献
11.
云计算环境促进了面向服务的分布式应用的发展和Web服务组合的高效实现。文章分析了云计算环境下Web服务组合模型以及工作过程,研究了Web服务组合优化的相关智能优化算法和基于Web服务顺序知识的人工蜂群算法。 相似文献
12.
An anomaly domains detection algorithm was proposed based on domains’ historical data.Based on statistical differences in historical data of legitimate domains and malicious domains,the proposed algorithm used domains’ lifetime,changes of whois information,whois information integrity,IP changes,domains that share same IP,TTL value,etc,as main parameters and concrete representations of features for classification were given.And on this basis the proposed algorithm constructed SVM classifier for detecting anomaly domains.Features analysis and experimental results show that the algorithm obtains high detection accuracy to unknown domains,especially suitable for detecting long lived malicious domains. 相似文献
13.
Anomaly detection in IP networks 总被引:8,自引:0,他引:8
Network anomaly detection is a vibrant research area. Researchers have approached this problem using various techniques such as artificial intelligence, machine learning, and state machine modeling. In this paper, we first review these anomaly detection methods and then describe in detail a statistical signal processing technique based on abrupt change detection. We show that this signal processing technique is effective at detecting several network anomalies. Case studies from real network data that demonstrate the power of the signal processing approach to network anomaly detection are presented. The application of signal processing techniques to this area is still in its infancy, and we believe that it has great potential to enhance the field, and thereby improve the reliability of IP networks. 相似文献
14.
Ali Maroosi Ravie Chandren Muniyandi 《International Journal of Communication Systems》2023,36(9):e5483
Cloud computing is an emerging technology in computing that provides different services over the Internet. It needs composite services to perform a complex task. Optimal selection of services that provides both functionality and nonfunctionality requirements is an NP-hard problem. This study uses nondeterministic parallel and distributed structures of membrane systems for the recently improved multiverse optimization algorithm to improve the quality of solutions. In the previous membrane-inspired algorithm, the population was divided into subpopulations that evolve different dynamic membranes. This study not only uses a conventional membrane-inspired approach to introduce a conventional membrane-inspired multiverse optimizer (CMIMVO) for the first time but also proposes an algorithm that divides the variables (dimension) into subgroups for different membranes called proposed membrane-inspired multiverse optimizer (PMIMVO). Thus, in PMIMVO, each membrane works on a subgroup to gain global information, which considers the best values obtained by other membranes for other variables. The PMIMVO shows promising results on benchmark function problems. Furthermore, simulation results show that the PMIMVO approach could achieve up to 38% improvement in integrated quality of service (QoS) with attributes including response time, price, availability, and reliability in comparison with the previous approaches, including genetics algorithm (GA), particle swarm optimization (PSO), gravitational search algorithm (GSA), moth–flame optimization (MFO) improved multiverse optimizer (MVO), and CMIMVO. 相似文献
15.
The virtual network embedding/mapping problem is a core issue of the network virtualization.It's mainly concerned with how to map virtual network requests to the substrate network efficiently.Previous ... 相似文献
16.
多租户数据中心环境下,保证云应用性能的一个重要因素是为租户应用提供可保证的通信带宽,这可以通过为每个租户提供一个独占的虚拟数据中心(VDC)来实现.研究了在物理数据中心网络中超额认购数据中心的嵌入问题.相对于一般虚拟数据中心,超额认购虚拟数据中虚拟机之间的流量模式更加复杂,因此首先利用线性规划方程阐述了流量模型及嵌入问题.对于虚拟机嵌入问题,提出了一种具有较低时间复杂度的启发式算法——分组扰动算法.最后,通过仿真实验将分组扰动算法和先前工作中提出的算法以及著名的first-fit进行了比较,实验表明所提算法在降低算法复杂度的同时提高了嵌入成功率. 相似文献
17.
Anomaly detection in wireless sensor networks is an important challenge for tasks such as fault diagnosis, intrusion detection, and monitoring applications. The algorithms developed for anomaly detection have to consider the inherent limitations of sensor networks in their design so that the energy consumption in sensor nodes is minimized and the lifetime of the network is maximized. In this survey article we analyze the state of the art in anomaly detection techniques for wireless sensor networks and discuss some open issues for research. 相似文献
18.
19.
20.
Cloud computing has drastically reduced the price of computing resources through the use of virtualized resources that are shared among users. However, the established large cloud data centers have a large carbon footprint owing to their excessive power consumption. Inefficiency in resource utilization and power consumption results in the low fiscal gain of service providers. Therefore, data centers should adopt an effective resource-management approach. In this paper, we present a novel load-balancing framework with the objective of minimizing the operational cost of data centers through improved resource utilization. The framework utilizes a modified genetic algorithm for realizing the optimal allocation of virtual machines (VMs) over physical machines. The experimental results demonstrate that the proposed framework improves the resource utilization by up to 45.21%, 84.49%, 119.93%, and 113.96% over a recent and three other standard heuristics-based VM placement approaches. 相似文献